CentOS 3 / 4 : wireshark (CESA-2006:0726)

medium Nessus Plugin ID 36335

Synopsis

The remote CentOS host is missing one or more security updates.

Description

New Wireshark packages that fix various security vulnerabilities are now available.

This update has been rated as having moderate security impact by the Red Hat Security Response Team.

Wireshark is a program for monitoring network traffic.

Several flaws were found in Wireshark's HTTP, WBXML, LDAP, and XOT protocol dissectors. Wireshark could crash or stop responding if it read a malformed packet off the network. (CVE-2006-4805, CVE-2006-5468, CVE-2006-5469, CVE-2006-5740)

A single NULL byte heap based buffer overflow was found in Wireshark's MIME Multipart dissector. Wireshark could crash or possibly execute arbitrary arbitrary code as the user running Wireshark.
(CVE-2006-4574)

Users of Wireshark should upgrade to these updated packages containing Wireshark version 0.99.4, which is not vulnerable to these issues.

Solution

Update the affected wireshark packages.

See Also

http://www.nessus.org/u?e94c9a5b

http://www.nessus.org/u?bb086be0

http://www.nessus.org/u?b15ea4a5

http://www.nessus.org/u?7668141e

http://www.nessus.org/u?dc70a9ee

http://www.nessus.org/u?1bab976d

Plugin Details

Severity: Medium

ID: 36335

File Name: centos_RHSA-2006-0726.nasl

Version: 1.15

Type: local

Agent: unix

Published: 4/23/2009

Updated: 1/4/2021

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Information

CPE: cpe:/o:centos:centos:4, cpe:/o:centos:centos:3, p-cpe:/a:centos:centos:wireshark-gnome, p-cpe:/a:centos:centos:wireshark

Required KB Items: Host/local_checks_enabled, Host/CentOS/release, Host/CentOS/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 11/9/2006

Vulnerability Publication Date: 10/27/2006

Reference Information

CVE: CVE-2006-4574, CVE-2006-4805, CVE-2006-5468, CVE-2006-5469, CVE-2006-5740

BID: 20762

RHSA: 2006:0726